130 likes | 222 Vues
Learn about the essential components of security policy, including data integrity, confidentiality, encryption, and access control. Explore topics such as authentication, packet filtering, and the role of firewalls in safeguarding networks.
E N D
Network Security Keng Siau University of Nebraska-Lincoln
Components of Security Policy • Describes items to be protected and rules for protection • Must cover computer systems, LANs, interconnection devices, Internet access, etc. • Development must include assessment of cost of protected information versus cost of protection
Aspects of Security • Data accessibility • Contents accessible • Data integrity • Contents remain unchanged • Data confidentiality • Contents not revealed
Responsibility and Control • Must be able to delegate and control responsibility • Accountability • Who is responsible for tracking access to data • Authorization • Who is responsible for who access data
Encryption and Privacy • Encryption • Rewrite contents so that they cannot be read without key • Encrypting function • Produces encrypted message • Decrypting function • Extracts original message • Encryption key • Parameter that controls encryption/decryption; sender and receiver share secret key
Encryption and Privacy • Sender produces • Encrypted Message = encrypt(Key, Message) • Sender transmits Encrypted Message on network • Receiver extracts • Message = decrypt(Key, Encrypted Message) • Requires sharing of secret Key • If Key is discovered, security is compromised
Public Key Encryption • Public key encryption uses two keys: • Private key • Kept secret by user • Public key • Published by user • To send a message to user 1 • Encrypt using User 1’s public key • User 1 decrypts using his/her private key
Authentication -- Digital Signatures • Goal • Guarantee that message must have originated with certain entity • Idea • Encrypt with private key • Decrypt with public key • Only owner of private key could have generated original message
Authentication and Privacy • Combine previous two techniques • A sends a message to B: • X = encrypt(PUB-B, encrypt(PRV-A, M)) • B extracts message: • M = decrypt(PUB-A, decrypt(PRV-B, X))
Packet Filtering • Can configure packet forwarding devices, e.g., routers, to drop certain packets • Consider example: • Suppose 192.5.48.0 is test network and 128.10.0.0 has controlling workstations • Install filter to allow packets only from 192.5.48.0 to 128.10.0.0 • Keeps potentially bad packets away from remainder of Internet
Internet Firewall • Packet filter at edge of intranet can disallow unauthorized packets • Restricts external packets to just a few internal hosts
Summary • Security is a problem because Internet is not owned by one entity • Organizations can use firewalls to prevent unauthorized access • Encryption and digital signatures can provide confidentiality and secure identification